Incident and Ransomware Reporting Requirement in Just Passed Spending Bill President Biden signed a bill that requires critical infrastructure operators to report significant cyber incidents to CISA within 72 hours after they reasonably believe an incident has occurred and within 24 hours of making a ransomware payment. The ransomware reporting requirement applies even if it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Asus Was Not Alone I wrote about the Asus supply chain attack in March (search for Asus in the blog search box). Attackers, somehow, compromised the development environment, injected malware and allowed the system to compile, digitally sign and distribute it through the software update process. Hundreds of thousands of clients were infected as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In case you didn’t know whom or what to believe in the battle between Gene Kaspersky and the U.S. Government, it just got a little weirder. You probably remember that the DoD told its people to remove Kaspersky’s software from it’s machines. They didn’t say why. But, no matter how this story plays out, that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There have always been questions about connections between Gene Kaspersky’s company and the Russian spy agencies like the FSB, but not necessarily any hard proof. Last month, President Trump ordered all federal agencies to remove Kaspersky anti virus software without any real explanation. Some thought it was as retribution while others thought it was over-reaction. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Some in Congress and the Intelligence Services are concerned that Kaspersky’s security software could be co-opted by the Russian government and be used to spy on American companies who use the software. Fundamentally, this is no different than concerns that people have that the U.S. spy agencies could or already have forced U.S. companies to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A newly published article in The Intercept says that the NSA and GCHQ hacked anti virus vendor’s software and networks in order to “neutralize the threat” posed by that software. Based on newly released Edward Snowden documents, GCHQ obtained a warrant in 2008-2009 to have legal permission to monitor web traffic, hack email and reverse engineer […]
Continue reading →
[DISPLAY_ACURAX_ICONS]